CN107196896A - Method for managing user right and device - Google Patents

Method for managing user right and device Download PDF

Info

Publication number
CN107196896A
CN107196896A CN201611258164.XA CN201611258164A CN107196896A CN 107196896 A CN107196896 A CN 107196896A CN 201611258164 A CN201611258164 A CN 201611258164A CN 107196896 A CN107196896 A CN 107196896A
Authority
CN
China
Prior art keywords
authentication
user
message
target
predetermined registration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611258164.XA
Other languages
Chinese (zh)
Inventor
梁凯
刘强
高峰
张建军
苏砫
张德生
姜淼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Taiyue Software Co Ltd
Original Assignee
Beijing Shenzhou Taiyue Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Taiyue Software Co Ltd filed Critical Beijing Shenzhou Taiyue Software Co Ltd
Priority to CN201611258164.XA priority Critical patent/CN107196896A/en
Publication of CN107196896A publication Critical patent/CN107196896A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a kind of method for managing user right and device, it is during any user operates to information system, service end is asked the corresponding predetermined registration operation of predetermined registration operation for having permission requirement, by determining corresponding target authentication mode, at least one target authentication user is determined according to the target authentication mode, and send authentication request message to target authentication user, target authentication user can pass through fingerprint, any of various ways such as gesture code carry out real-time authentication, produce and to service end return authentication response message, the authentication response message that service end is returned according to target authentication user judges whether to perform the predetermined registration operation that operation user is asked, so as to find and control the sensitive operation being likely to occur in user's operating process in time, improve the security of information system.The verification process that the application is provided will not be limited by Short Message Service Gateway etc., so as to reduce maintenance cost, but also can be improved Consumer's Experience, be improved authentication efficiency.

Description

Method for managing user right and device
Technical field
The application is related to field of information security technology, more particularly to a kind of method for managing user right and device.
Background technology
With the development of economy and information technology, increasing enterprise is realized to enterprise by building up an information system The collection of information, arrangement, processing, propagation, storage and utilize, make every effort in plan, tissue, leader and can be with when controlling business activity Effective distribution of resources, Sharing Management, coordinate operation are reached, maximum benefit is created with minimum consumption.Due to company information system System often relates to enterprise-essential core domain, operation system and business service, ensures core business data, operation safety, specification Operating personnel's sensitive operation behavior, controls the behavior authorities such as O&M sensitive operation, high-risk operation, and reduction is lost, distorted, obtaining in violation of rules and regulations Risk of company information etc. is taken to be particularly important.
A kind of more universal way to manage to user right in information system of existing application, is in advance each user configuring Corresponding user right, after in User logs in the information system, can perform is allowed in its corresponding extent of competence Operation;This method lacks corresponding process examination & approval, it is impossible to control the sensitivity being likely to occur after User logs in operating process Operation, security is relatively low.
Therefore, need a kind of new user authority management scheme badly, with it is more convenient, efficiently realize user in information system Operating right is managed, the safety of guarantee information system.
The content of the invention
This application provides a kind of method for managing user right and device, with it is more convenient, efficiently realize user in information Operating right is managed in system, the safety of guarantee information system.
In order to solve the above-mentioned technical problem, the embodiment of the present application discloses following technical scheme:
The first aspect of the embodiment of the present application is there is provided a kind of method for managing user right, the service applied to information system End, including:
When receiving predetermined registration operation request, determine that the predetermined registration operation asks corresponding target authentication mode;
At least one target authentication user is determined according to the target authentication mode, and sent to the target authentication user Authentication request message;
Receive the authentication response message that the target authentication user returns;
When the authentication response message that all target authentication users return is the first response message that expression certification passes through, Perform the predetermined registration operation and ask corresponding predetermined registration operation.
Optionally, when the target authentication mode is personal authentication, at least one is determined according to the target authentication mode Individual target authentication user, including:Determine that the corresponding operation user of the predetermined registration operation request is the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:Certification is sent to the operation user Request message.
Optionally, when the target authentication mode be multi-person synergy certification when, according to the target authentication mode determine to A few target authentication user, including:Determine that the predetermined registration operation asks corresponding operation user, and/or, used with the operation The related person liable user in family is the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:Sent out simultaneously to each person liable user Send the authentication request message.
Optionally, when the target authentication mode be many people examine certification when, according to the target authentication mode determine to A few target authentication user, including:It is determined that at least two duties that operation user corresponding to predetermined registration operation request is related The user that lets people is the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:
Determine the authentication sequence of at least two person liable user;
For the adjacent person liable user of any two authentication sequence, preferentially used to the forward first owner of authentication sequence Family sends the authentication request message, and is the described first response in the authentication response message that the first owner user returns During message, to authentication sequence, secondary owner rearward sends authentication request message.
The second aspect of the embodiment of the present application is there is provided a kind of method for managing user right, the client applied to information system End, including:
The system message that described information server of the system is sent is received, the system message at least disappears including certification request Breath;
At least one first authentication information of user is gathered according to the authentication request message;
Authentication response message corresponding with the authentication request message is generated according to the first authentication information collected;
The authentication response message is sent to described information server of the system so that described information server of the system according to The authentication response message judges whether to perform corresponding predetermined registration operation.
Optionally, methods described also includes:
It is determined that the News Category of the every system message received;
The system message is managed according to the News Category.
Optionally, the News Category includes the effective classification immediately only in preset duration;
The system message is managed according to the News Category, including:
For any the first system message for belonging to the instant classification, after the first system message is shown, and/ Or, the interval duration between current time and the time of reception of the first system message exceedes the first system message pair During the preset duration answered, the first system message is deleted.
Optionally, methods described also includes:
When receiving system message and checking request, judge that the system message checks the corresponding second system message of request Whether it is default sensitive message;
When the second system message is default sensitive message, at least one second certification letter of the user is gathered Breath;
Judged whether to show the second system message according to second authentication information.
Optionally, first authentication information is included in fingerprint, Quick Response Code, dynamic code, gesture code, vocal print, face-image At least one;
Second authentication information includes at least one in fingerprint, Quick Response Code, dynamic code, gesture code, vocal print, face-image Kind.
The third aspect of the embodiment of the present application there is provided a kind of user authority management device, including:
Authentication mode determining unit, for when receiving predetermined registration operation request, determining the predetermined registration operation request correspondence Target authentication mode;
Certification messaging unit, for determining at least one target authentication user according to the target authentication mode, and Authentication request message is sent to the target authentication user, the authentication response message that the target authentication user returns is received;
Operating right control unit, the authentication response message for being returned in all target authentication users is expression certification During the first response message passed through, perform the predetermined registration operation and ask corresponding predetermined registration operation.
Optionally, the certification messaging unit includes following at least one:
Personal authentication's Transmit-Receive Unit, for when the target authentication mode is personal authentication, being asked with the predetermined registration operation It is the target authentication user to ask corresponding operation user, sends the authentication request message, and receives the authentication response and disappears Breath;
Certification Transmit-Receive Unit is cooperateed with, for when the target authentication mode is multi-person synergy certification, to be preset with described At least two related person liable users of the corresponding operation user of operation requests are the target authentication user, and simultaneously to each Person liable user sends the authentication request message, and the authentication response message that each person liable user returns is received respectively;
Certification Transmit-Receive Unit is examined, for when the target authentication mode is that many people examine certification, to be preset with described At least two related person liable users of the corresponding operation user of operation requests are the target authentication user, and described in determination extremely The authentication sequence of few two person liable users, it is preferentially suitable to certification for the adjacent person liable user of any two authentication sequence The forward first owner user of sequence sends the authentication request message, and the certification returned in the first owner user rings When answering message for first response message, to authentication sequence, secondary owner rearward sends authentication request message.
The fourth aspect of the embodiment of the present application there is provided a kind of user authority management device, including:
System message receiving unit, the system message for receiving the transmission of described information server of the system, the system disappears Breath at least includes authentication request message;
Certification message processing unit, at least one first certification for gathering user according to the authentication request message is believed Breath, authentication response message corresponding with the authentication request message is generated according to the first authentication information collected, and will be described Authentication response message is sent to described information server of the system, so that described information server of the system disappears according to the authentication response Breath judges whether to perform corresponding predetermined registration operation.
Optionally, described device also includes:
System message administrative unit, for the News Category for every system message for determining to receive, and disappears according to described Breath classification is managed to the system message;
The system message administrative unit at least includes:
Message crash handling unit, for for any the first system message for belonging to the instant classification, described After one system message is shown, and/or, the interval duration between current time and the time of reception of the first system message During preset duration corresponding more than the first system message, the first system message is deleted;
Wherein, the first system message for belonging to the instant classification is efficient system disappears only in preset duration Breath.
Optionally, described device also includes:
Re-authentication unit, for when receiving system message and checking request, judging that the system message checks request Whether corresponding second system message is default sensitive message, and when the second system message is default sensitive message, is adopted Collect at least one second authentication information of the user, judge whether to show the second system according to second authentication information Message.
Optionally, the first authentication information of certification message processing unit collection include fingerprint, Quick Response Code, dynamic code, At least one of gesture code, vocal print, face-image;
Second authentication information of re-authentication unit collection include fingerprint, Quick Response Code, dynamic code, gesture code, vocal print, At least one of face-image.
From above technical scheme, the embodiment of the present application during any user operates to information system, Service end is asked the corresponding predetermined registration operation of predetermined registration operation for having permission requirement, by determining corresponding target authentication mode, root At least one target authentication user is determined according to the target authentication mode, and authentication request message, mesh are sent to target authentication user Real-time authentication can be carried out by any of various ways such as fingerprint, gesture code by marking certification user, be produced and to service end Return authentication response message, the authentication response message that service end is returned according to target authentication user judges whether to perform operation user The predetermined registration operation asked, so as to find and control the sensitive operation being likely to occur in user's operating process in time, is carried The security of high information system.The verification process that the application is provided will not be limited by Short Message Service Gateway etc., so as to reduce dimension Cost is protected, but also Consumer's Experience can be improved, authentication efficiency is improved.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other accompanying drawings according to these accompanying drawings.
A kind of flow chart for method for managing user right applied to service end that Fig. 1 provides for the embodiment of the present application;
Fig. 2 is the Organization Chart of information system in the embodiment of the present application;
A kind of signal flow diagram for method for managing user right that Fig. 3 provides for the embodiment of the present application;
A kind of authentication request message display interface schematic diagram that Fig. 4 provides for the embodiment of the present application;
Signal flow diagram during personal authentication is performed in the method for managing user right that Fig. 5 provides for the embodiment of the present application;
Signal stream during multi-person synergy certification is performed in the method for managing user right that Fig. 6 provides for the embodiment of the present application Figure;
Signal stream during many people's examination & approval certifications is performed in the method for managing user right that Fig. 7 provides for the embodiment of the present application Figure;
A kind of flow chart for method for managing user right applied to client that Fig. 8 provides for the embodiment of the present application;
A kind of structural representation for user authority management device that Fig. 9 provides for the embodiment of the present application;
The structural representation for another user authority management device that Figure 10 provides for the embodiment of the present application.
Embodiment
In order that those skilled in the art more fully understands the technical scheme in the embodiment of the present application, and make the application real Applying the above-mentioned purpose of example, feature and advantage can be more obvious understandable, below in conjunction with the accompanying drawings to technical side in the embodiment of the present application Case is described in further detail.
A kind of stream for method for managing user right applied to information system services end that Fig. 1 provides for the embodiment of the present application Cheng Tu;The method for managing user right can apply to any one information system, be applied particularly to the service end of information system. As shown in Fig. 2 in addition to service end 100, the information system can also include multiple client 200, each client 200 and clothes Business can be communicated between end 100 by internet, realize data interaction.
Various information in information system are held by the method for managing user right that the embodiment of the present application is provided in any user Row is checked, changed, deleting etc. operate during, responsible person concerned can be entered by respective client to the operation of the user Row is authorized or forbidden, and realizes control in operation to user's operating right.Wherein, client 200 can be mobile visitor Family end so that responsible person concerned completes the control to user's operating right whenever and wherever possible.Fig. 3 is that the method for managing user right is held Data interaction signal flow diagram during row between the service end and client of the information system.
Reference picture 1 and Fig. 3, the method for managing user right comprise the following steps:
S11, information system service end when receiving predetermined registration operation request, determine that predetermined registration operation request is corresponding Target authentication mode, and at least one target authentication user is determined according to the target authentication mode.
In the embodiment of the present application, information system security can will be influenceed in advance, need responsible person concerned to be authenticated mandate Sensitive operation (such as delete some information, change the operation of some information) be labeled as predetermined registration operation, on its operation requests is State predetermined registration operation request.User can be visited by PC (Personal Computer, PC) or the mobile client of oneself The operation such as ask information system and ask execution information to be checked, change, deleting, now PC or mobile client are sent to service end Corresponding operation requests:When the operation requests are not predetermined registration operation requests, that is, associated user is not needed to be authenticated mandate, clothes Business end directly performs and responded the operation that the user is asked;When the operation requests are that predetermined registration operation is asked, service end is performed Above-mentioned steps S11, starts the request to the user and is authenticated, to determine whether the user has the authority for performing the operation.
Optionally, the request reason for the user's input for proposing the request can be included in the operation requests that service end is received (the reasons why i.e. request performs the operation), request operating time, the information such as the user account number for the request of deducting a percentage can also be included, such as " user A is on October 1st, 2016 because business is adjusted for authentication request message shown by a kind of client display interface shown in Fig. 4 Whole to need, " products quotation " information in request modification system please be authenticated.”;It can be seen that, target authentication user can be according to these Information clear request content, so as to make the authentication processing held water.
In the embodiment of the present application, convenience when security and the user's operation of information system is considered, can be right The different operating of information system sets different Permission Levels, and different Permission Levels are correspondingly arranged different authentication modes, i.e., Permission Levels are higher, and verification process is more complicated, security is higher (such as needing more users to participate in certification).Therefore, connecing When receiving predetermined registration operation request, step S11 is first carried out in service end, determines that the predetermined registration operation asks corresponding target authentication side Formula.
In the embodiment of the present application, the certification user required for different authentication modes is incomplete same, for example, Permission Levels Relatively low predetermined registration operation asks corresponding target authentication mode, can only need to a target authentication user, and Permission Levels compared with High predetermined registration operation asks corresponding target authentication mode, can set two or more target authentications of needs user simultaneously Participate in certification.
S12, service end send authentication request message to the target authentication user.
S13, service end receive the authentication response message that the target authentication user returns.
In the embodiment of the present application, the service end of information system it is determined that after target authentication user required for this certification, Certification request information can be sent to target authentication user;Target authentication user can receive this by mobile client and recognize Request message is demonstrate,proved, and is handled, to determine whether that operation user (user filed a request) performs the certification request Predetermined registration operation corresponding to message, and generate corresponding authentication response message and be back to service end.
S14, when all target authentication users return authentication response message be represent certification pass through first response disappear During breath, service end performs the predetermined registration operation and asks corresponding predetermined registration operation.
According to result of the target authentication user to above-mentioned authentication request message, above-mentioned authentication response message at least can be with Including two kinds:Target authentication user confirms to allow operation user to perform corresponding predetermined registration operation, the then authentication response message generated The first response message passed through for expression certification;Conversely, target authentication user confirms that quiescing user performs corresponding preset Operation, then the second response message that the authentication response message generated does not pass through for expression certification.
In the embodiment of the present application, the service end for information system that and if only if receives recognizing for all target authentication users returns When to demonstrate,prove response message and the authentication response message be the first response message, illustrate that all target authentication users allow to operate User performs corresponding predetermined registration operation, and now service end just performs and responds the predetermined registration operation.
, whereas if the non-return authentication response message of at least one target authentication user, or at least one target authentication The authentication response message that user returns is the second response message, then illustrates that not all target authentication user allows operation User performs the predetermined registration operation, is now the security of guarantee information system, service end does not proceed to respond to the predetermined registration operation.
Optionally, if in preset time, service end does not receive the authentication response of either objective certification user return Message, then can give tacit consent to target authentication user does not allow operation user to perform corresponding predetermined registration operation.
Optionally, service end judge be not responding to operate user request predetermined registration operation when, can operation operation The corresponding prompt message of interface display, to point out this certification of operation user not pass through, lack of competence performs the operation of its request.
From above technical scheme, the embodiment of the present application during any user operates to information system, Service end is asked the corresponding predetermined registration operation of predetermined registration operation for having permission requirement, by determining corresponding target authentication mode, root At least one target authentication user is determined according to the target authentication mode, and authentication request message, root are sent to target authentication user The authentication response message returned according to target authentication user judges whether the predetermined registration operation that execution operation user is asked, so as to The sensitive operation being likely to occur in user's operating process is found and controlled in time, the security of information system is improved.
Optionally, in the embodiment of the present application, above-mentioned authentication request message can be sent to each target by internet recognizes Demonstrate,prove user mobile client, target authentication user can mobile client by fingerprint, Quick Response Code, dynamic code, gesture code, Any mode such as vocal print, face recognition carries out real-time authentication, to generate in time and return to corresponding authentication response message.
Short message verification code is sent to user mobile phone relative to system in correlation technique, allows user to reply the short message or this is short Letter identifying code is input to the mode that implementation process in the ps of PC is examined, and the embodiment of the present application is by internet to target Certification user sends authentication request message, and corresponding target authentication user can be real-time when mobile client is in networking state Receive authentication request message, it is possible to any of various ways supported based on mobile clients such as fingerprint, Quick Response Codes place The authentication request message is managed, and generates corresponding authentication response message, and returns to the authentication response message yet by internet To service end, both realized in operating process and controlled, again will not be by Short Message Service Gateway, user's mobile device species and model, fortune The limitation such as business is sought, so as to reduce maintenance cost, and the operation for the user that certification is participated in control process is also simplify, i.e., No longer needing user, operation is replied message in mobile terminal, or in PC ends input validation code, so as to improve Consumer's Experience, is improved Authentication efficiency.
In one feasible embodiment of the application, for the relatively low predetermined registration operation of jurisdictions mandate, determine in step s 11 Target authentication mode can be personal authentication, i.e., user need to be operated to be authenticated, therefore corresponding target can be determined Certification user's only one, and ask corresponding operation user for the predetermined registration operation;Accordingly, in step s 12, information system Service end directly sends authentication request message to the operation user.
For example, referring to Fig. 5, information system services termination receives the default behaviour with user A account number login system and transmission Ask, when it is determined that target authentication mode is personal authentication, while also having determined that the target authentication needed for this certification is used Family is user A (step S21), directly sends authentication request message (step S22), user A visitor to user A mobile client Believed when receiving the authentication request message according to the corresponding authentication response of user A processing operation generation certification at family end Breath, and service end (step S23) is returned it to, service end is judging the authentication response information of user A returns as the first response During message, corresponding predetermined registration operation (step S24) is performed, so that ensure that the user that request performs predetermined registration operation is A, without Be other lacks of competence personnel performs the predetermined registration operation using A account number, has not only ensured the security of information system, can with and When remind user A oneself account number to be stolen.
In the application in another feasible embodiment, for the higher predetermined registration operation of jurisdictions mandate, in step s 11 really Fixed target authentication mode can be multi-person synergy certification, that is, need two or more associated users to participate in certification, therefore Corresponding target authentication user at least two can be determined, one of target authentication user still can be the predetermined registration operation Corresponding operation user is asked, other target authentications user can be the one or more persons liable related to operation user, For example with operation user affiliated function identical user, or operation user affiliated function higher level's department user etc..
For example, referring to Fig. 6, information system services termination receives the default behaviour with user A account number login system and transmission Ask, when it is determined that target authentication mode is multi-person synergy certification, the target authentication user needed for determining this certification is use Family A and responsible person concerned B (step S31), then while sending authentication request message (step to A and B mobile client respectively S32), user A client generates corresponding authentication response message according to user A processing operation, and is back to service end (step Rapid S331), meanwhile, responsible person concerned B client generates corresponding authentication response message also according to B processing operation, and returns Service end (step S332) is back to, when service end receives the authentication response message that A and B are returned, and it is the first response to confirm During message, corresponding predetermined registration operation (step S34) is performed.It can be seen that, there are user A and B participation in this verification process simultaneously, relatively In personal authentication's flow shown in Fig. 5, the security of corresponding operating can be improved.
Optionally, in other feasible embodiments, participating in the target authentication user of multi-person synergy certification can not include Operation user, and the responsible person concerned of all operation users.
In the application in another feasible embodiment, for the higher predetermined registration operation of jurisdictions mandate, in step s 11 really Fixed target authentication mode can examine certification for many people, that is, need two or more associated users according to certain suitable Sequence successively participates in certification, therefore can determine corresponding target authentication user at least two, and these target authentications user recognizes Card order is also to determine, for example, multiple target authentication users can be controlled successively to be examined according to the order of position from low to high Criticize certification.Wherein, in many people's examination & approval verification process, target authentication user is preferably operation corresponding with predetermined registration operation request At least two related persons liable of user, such as with operation user affiliated function identical user, the affiliated portion of operation user Higher level's department user of door etc..
For example, referring to Fig. 7, information system services termination receives the default behaviour with user A account number login system and transmission Ask, it is determined that target authentication mode is many people examine certification when, determine the target authentication user needed for this certification be with Person liable B and C (step S31) related user A, is determined first by responsible person concerned B according to the high low factor of B and C position Examination & approval certification is carried out, therefore first sends authentication request message (step S421), related responsibility to responsible person concerned B mobile client People B client generates corresponding authentication response message according to B processing operation, and is back to service end (step S431), takes Business end judges whether the authentication response message that B is returned is to represent the first response message that certification passes through, if it is not, then service end This identifying procedure can directly be terminated, and no longer send authentication request message to responsible person concerned C, while table can also be generated Show this examination & approval unsanctioned prompt message of certification, and the prompt message is showed into operation user A., whereas if what B was returned Authentication response message is the first response message, then service end continues to disappear to the above-mentioned certification request of next responsible person concerned C transmissions Cease (step S422);Responsible person concerned C client generates corresponding authentication response message according to C processing operation, and returns To service end (step S432), service end judges whether the authentication response message that C is returned is to represent the first response that certification passes through Message, if it is not, then terminating this identifying procedure, if the first response message, then because C is that authentication sequence comes finally The target authentication user of one, therefore this examination & approval certification passes through, service end can continue executing with corresponding predetermined registration operation.
It can be seen that, relative to two kinds of identifying procedures of Fig. 5 and Fig. 6, many people's examination & approval identifying procedures are more complicated shown in Fig. 7, improving While the security of information system, it can also be ensured that underproof predetermined registration operation request is quickly recognized with minimum user, is subtracted The workload of few user's operation, reduces service end and the interaction times of mobile terminal.
Optionally, in other feasible embodiments, operation user can also participate in many as target authentication user People examines certification.
In practical application, the corresponding target authentication mode of every kind of predetermined registration operation can be set and required in service end with advance Target authentication user, so that when receiving predetermined registration operation request, service end, which can be inquired about directly, to be obtained this certification and should adopt Target authentication mode and required target authentication user.
From above technical scheme, the embodiment of the present application provides a variety of user right authentication modes for information system, So that user authority management process is more intelligent, security is higher.
Emphasis illustrates the method for managing user right of the application offer from service end angle above, is situated between with reference to Fig. 8 The flow chart for another method for managing user right applied to information system client that the embodiment of the present application that continues is provided.Reference Fig. 8, this method comprises the following steps:
S61, the system message for receiving the transmission of described information server of the system, the system message at least include certification request Message.
S62, at least one first authentication information according to authentication request message collection user.
Client can directly eject information alert frame when receiving authentication request message, in time to ask the certification Message display is sought to user;When the administration interface of the authentication request message can also be clicked to enter in user, just shown.With Family is handled it after the authentication request message is seen, the fingerprint that can specifically be supported by the client, Quick Response Code, Any mode such as dynamic code, gesture code, vocal print, face recognition carries out real-time authentication, and now, client-side interface collects user The first authentication information, i.e. first authentication information can be fingerprint, Quick Response Code, dynamic code, gesture code, vocal print, face-image At least one of.
The first authentication information that S63, basis are collected generates authentication response message corresponding with the authentication request message.
S64, the authentication response message sent to described information server of the system, so that described information server of the system Judged whether to perform corresponding predetermined registration operation according to the authentication response message.
The data exchange process of client and service end is referred to signal flow diagram shown in Fig. 3 in said process, herein not Repeat again.
Optionally, method for managing user right shown in Fig. 6 can apply to mobile client (such as smart mobile phone, flat board Computer etc.) so that target authentication user can timely receive authentication request message, and be rapidly completed certification, improve certification effect Rate.
It can be seen that, in the embodiment of the present application, user need not be concerned about which kind of authentication mode is each predetermined registration operation specifically use, and Give service end completely to be controlled, target authentication user is also identical in the operation of its client executing, will not be because recognizing Card mode difference and changes, therefore, the embodiment of the present application can reduce user operation complexity, raising Consumer's Experience, together Shi Tigao authentication efficiencies.
Optionally, the basis described in step S63 is collected the generation of the first authentication information and the authentication request message pair The authentication response message answered, the first authentication information fallen and (or the certification of itself storage will be gathered by being specifically as follows client Being carried in request message) default authentication information matched, if the match is successful, the first sound that generation expression certification passes through Message is answered, if it fails to match, generation represents unsanctioned second response message of certification.
Optionally, in step S63, it can also will directly gather the first authentication information and be compiled as authentication response message Service end is back to, the matching operation of first authentication information and default authentication information is performed by service end, and obtains matching knot Really, that is, authentication result is obtained.
In one feasible embodiment of the application, the method for managing user right applied to client is except shown in Fig. 8 Real-time authentication step outside, can also comprise the following steps:
It is determined that the News Category of the every system message received;
The system message is managed according to the News Category.
In the embodiment of the present application, the information exchange between client and service end is not limited only to authentication request/response messages, Client can also receive other systems message, for example, service end perform predetermined registration operation after generate " data xxx is repaiied Change ", the operating result prompting message such as " data xxx has been deleted ".
Optionally, it can be classified according to the factor such as the content of system message, ageing., can be with exemplified by ageing It is divided into the non-instant classification of effective classification and continuously effective immediately only in preset duration;Above-mentioned authentication request message is one Plant the system message of instant classification.
The embodiment of the present application is managed collectively by classifying to system message according to News Category, inhomogeneity Other system message is shown in different interfaces, consequently facilitating user is quickly found out the message for oneself wanting to see.
In one feasible embodiment of the application, for the system message of above-mentioned instant classification, the user authority management Method can also comprise the following steps:
For any the first system message for belonging to the instant classification, after the first system message is shown, and/ Or, the interval duration between current time and the time of reception of the first system message exceedes the first system message pair During the preset duration answered, the first system message is deleted.
For example, for certain authentication request message, after it is demonstrated, or generate after corresponding authentication response message, The authentication request message is failure, so as to be deleted immediately, to save memory space.In practical application, it may pass through Some time user does not check the authentication request message, and client is also failed to service end return authentication response message, to keep away Exempt to wait as long for authentication result, it is not authenticated that service end can directly give tacit consent to the user, now the authentication request message Failure, therefore when the storage duration of certain authentication request message in the client exceedes preset duration, can also directly be deleted Remove.
It can be seen that, the above-mentioned management process to instant message realizes burn-after-reading, outdated information is cleared up in time, it is to avoid mistake Many invalid informations take memory space for a long time.
In one feasible embodiment of the application, above-mentioned method for managing user right can also comprise the following steps:
When receiving system message and checking request, judge that the system message checks the corresponding second system message of request Whether it is default sensitive message;
When the second system message is default sensitive message, at least one second certification letter of the user is gathered Breath;
Judged whether to show the second system message according to second authentication information.
In the embodiment of the present application, user can ask the system message that viewing client-side is received at any time, when user's request When the system message checked is default sensitive message, by gathering the second authentication information to proposing that this checks that the user of request is carried out Real-time authentication, in certification by rear, client just shows the system message, so as to further ensure the security of information.
Optionally, above-mentioned second authentication information can also include fingerprint, Quick Response Code, dynamic code, gesture code, vocal print, face At least one of image.
The method for managing user right applied to client provided from above technical scheme, the embodiment of the present application, Service end can be not only coordinated to carry out real-time authentication during user performs operation to information system, can also be to each germline System message is managed collectively, and null system message is removed in time, and to the re-authentication for checking operation of sensory system message, Further improve security of the information system in client.
Accordingly, the embodiment of the present application also provides a kind of user authority management device, and the device is specifically as follows information system The service end of system, or be built in the chip for realizing user authority management function in service end, or have with service end What is communicated to connect manages device independently.Structural representation shown in reference picture 9, above-mentioned user authority management device at least includes:
Authentication mode determining unit 910, for when receiving predetermined registration operation request, determining the predetermined registration operation request pair The target authentication mode answered;
Certification messaging unit 920, for determining at least one target authentication user according to the target authentication mode, And authentication request message is sent to the target authentication user, receive the authentication response message that the target authentication user returns;
Operating right control unit 930, the authentication response message for being returned in all target authentication users is to represent During the first response message that certification passes through, perform the predetermined registration operation and ask corresponding predetermined registration operation.
From above technical scheme, the embodiment of the present application during any user operates to information system, Service end is asked the corresponding predetermined registration operation of predetermined registration operation for having permission requirement, by determining corresponding target authentication mode, root At least one target authentication user is determined according to the target authentication mode, and authentication request message, root are sent to target authentication user The authentication response message returned according to target authentication user judges whether the predetermined registration operation that execution operation user is asked, so as to The sensitive operation being likely to occur in user's operating process is found and controlled in time, the security of information system is improved.
Optionally, the data processing unit 920 can specifically include following at least one:
Personal authentication's Transmit-Receive Unit, for when the target authentication mode is personal authentication, being asked with the predetermined registration operation It is the target authentication user to ask corresponding operation user, sends the authentication request message, and receives the authentication response and disappears Breath;
Certification Transmit-Receive Unit is cooperateed with, for when the target authentication mode is multi-person synergy certification, to be preset with described At least two related person liable users of the corresponding operation user of operation requests are the target authentication user, and simultaneously to each Person liable user sends the authentication request message, and the authentication response message that each person liable user returns is received respectively;
Certification Transmit-Receive Unit is examined, for when the target authentication mode is that many people examine certification, to be preset with described At least two related person liable users of the corresponding operation user of operation requests are the target authentication user, and described in determination extremely The authentication sequence of few two person liable users, it is preferentially suitable to certification for the adjacent person liable user of any two authentication sequence The forward first owner user of sequence sends the authentication request message, and the certification returned in the first owner user rings When answering message for first response message, to authentication sequence, secondary owner rearward sends authentication request message.
From above technical scheme, the embodiment of the present application provides a variety of user right authentication modes for information system, So that user authority management process is more intelligent, security is higher.
The structured flowchart for the user authority management device that Figure 10 provides for another embodiment, the device is specifically as follows information The client of system, is specifically as follows the mobile clients such as smart mobile phone, tablet personal computer, or be built in client Realize the chip of user authority management function.Reference picture 10, the device at least includes:
System message receiving unit 1010, the system message for receiving the transmission of described information server of the system, the system Message of uniting at least includes authentication request message;
Certification message processing unit 1020, at least one first for gathering user according to the authentication request message is recognized Information is demonstrate,proved, authentication response message corresponding with the authentication request message is generated according to the first authentication information collected, and will The authentication response message is sent to described information server of the system, so that described information server of the system is rung according to the certification Message is answered to judge whether to perform corresponding predetermined registration operation.
Based on above-mentioned user authority management device, user can timely receive authentication request message, and be rapidly completed and recognize Card, improves authentication efficiency.In the embodiment of the present application, user need not be concerned about which kind of authenticating party is each predetermined registration operation specifically use Formula, and give service end completely and be controlled, target authentication user is also identical in the operation of its client executing, will not Change because of the difference of authentication mode, therefore, the embodiment of the present application can reduce the complexity of user's operation, improve user's body Test, while improving authentication efficiency.
Optionally, the first authentication information of certification message processing unit collection include fingerprint, Quick Response Code, dynamic code, At least one of gesture code, vocal print, face-image.
Optionally, the user authority management device shown in Figure 10 can also include:
System message administrative unit 1030, for the News Category for every system message for determining to receive, and according to institute News Category is stated to be managed the system message.
Wherein, the system message administrative unit at least includes:
Message crash handling unit, for for any the first system message for belonging to the instant classification, described After one system message is shown, and/or, the interval duration between current time and the time of reception of the first system message During preset duration corresponding more than the first system message, the first system message is deleted.
The first system message for belonging to the instant classification is the efficient system message only in preset duration.
The embodiment of the present application is managed collectively by classifying to system message according to News Category, inhomogeneity Other system message is shown in different interfaces, consequently facilitating user is quickly found out the message for oneself wanting to see.Meanwhile, it is right The management process of instant message, realizes burn-after-reading, outdated information is cleared up in time, it is to avoid excessive invalid information takes for a long time deposits Store up space.
Optionally, the user authority management device shown in Figure 10 can also include:
Re-authentication unit, for when receiving system message and checking request, judging that the system message checks request Whether corresponding second system message is default sensitive message, and when the second system message is default sensitive message, is adopted Collect at least one second authentication information of the user, judge whether to show the second system according to second authentication information Message.
Optionally, the second authentication information of the re-authentication unit collection includes fingerprint, Quick Response Code, dynamic code, gesture At least one of code, vocal print, face-image.
In the embodiment of the present application, user can ask the system message that viewing client-side is received at any time, when user's request When the system message checked is default sensitive message, by gathering the second authentication information to proposing that this checks that the user of request is carried out Real-time authentication, in certification by rear, client just shows the system message, so as to further ensure the security of information.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiments.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (10)

1. a kind of method for managing user right, it is characterised in that applied to information system services end, including:
When receiving predetermined registration operation request, determine that the predetermined registration operation asks corresponding target authentication mode;
At least one target authentication user is determined according to the target authentication mode, and certification is sent to the target authentication user Request message;
Receive the authentication response message that the target authentication user returns;
When the authentication response message that all target authentication users return is the first response message that expression certification passes through, perform The predetermined registration operation asks corresponding predetermined registration operation.
2. according to the method described in claim 1, it is characterised in that when the target authentication mode is personal authentication, according to The target authentication mode determines at least one target authentication user, including:Determine that the predetermined registration operation asks corresponding operation User is the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:Certification request is sent to the operation user Message.
3. according to the method described in claim 1, it is characterised in that when the target authentication mode is multi-person synergy certification, At least one target authentication user is determined according to the target authentication mode, including:Determine that the predetermined registration operation request is corresponding User is operated, and/or, the person liable user related to the operation user is the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:Simultaneously institute is sent to each person liable user State authentication request message.
4. according to the method described in claim 1, it is characterised in that when the target authentication mode is that many people examine certification, At least one target authentication user is determined according to the target authentication mode, including:It is determined that corresponding with predetermined registration operation request The related at least two person liable users of operation user be the target authentication user;
Accordingly, authentication request message is sent to the target authentication user, including:
Determine the authentication sequence of at least two person liable user;
For the adjacent person liable user of any two authentication sequence, preferentially sent out to the forward first owner user of authentication sequence The authentication request message is sent, and the authentication response message returned in the first owner user is first response message When, to authentication sequence, secondary owner rearward sends authentication request message.
5. a kind of method for managing user right, it is characterised in that applied to information system client, including:
The system message that described information server of the system is sent is received, the system message at least includes authentication request message;
At least one first authentication information of user is gathered according to the authentication request message;
Authentication response message corresponding with the authentication request message is generated according to the first authentication information collected;
The authentication response message is sent to described information server of the system, so that described information server of the system is according to described Authentication response message judges whether to perform corresponding predetermined registration operation.
6. method according to claim 5, it is characterised in that also include:
It is determined that the News Category of the every system message received;
The system message is managed according to the News Category.
7. method according to claim 6, it is characterised in that the News Category includes effective only in preset duration Instant classification;
The system message is managed according to the News Category, including:
For any the first system message for belonging to the instant classification, after the first system message is shown, and/or, It is corresponding that interval duration between current time and the time of reception of the first system message exceedes the first system message Preset duration when, delete the first system message.
8. the method according to any one of claim 5 to 7, it is characterised in that also include:
When receiving system message and checking request, judge whether the system message checks the corresponding second system message of request To preset sensitive message;
When the second system message is default sensitive message, at least one second authentication information of the user is gathered;
Judged whether to show the second system message according to second authentication information.
9. a kind of user authority management device, it is characterised in that including:
Authentication mode determining unit, for when receiving predetermined registration operation request, determining that the predetermined registration operation asks corresponding mesh Mark authentication mode;
Certification messaging unit, for determining at least one target authentication user according to the target authentication mode, and to institute State target authentication user and send authentication request message, receive the authentication response message that the target authentication user returns;
Operating right control unit, the authentication response message for being returned in all target authentication users is to represent that certification passes through The first response message when, perform the predetermined registration operation and ask corresponding predetermined registration operation.
10. a kind of user authority management device, it is characterised in that including:
System message receiving unit, the system message for receiving the transmission of described information server of the system, the system message is extremely Include authentication request message less;
Certification message processing unit, at least one first authentication information for gathering user according to the authentication request message, Authentication response message corresponding with the authentication request message is generated according to the first authentication information for collecting, and by the certification Response message is sent to described information server of the system, so that described information server of the system is sentenced according to the authentication response message It is disconnected whether to perform corresponding predetermined registration operation.
CN201611258164.XA 2016-12-30 2016-12-30 Method for managing user right and device Pending CN107196896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611258164.XA CN107196896A (en) 2016-12-30 2016-12-30 Method for managing user right and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611258164.XA CN107196896A (en) 2016-12-30 2016-12-30 Method for managing user right and device

Publications (1)

Publication Number Publication Date
CN107196896A true CN107196896A (en) 2017-09-22

Family

ID=59870877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611258164.XA Pending CN107196896A (en) 2016-12-30 2016-12-30 Method for managing user right and device

Country Status (1)

Country Link
CN (1) CN107196896A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848117A (en) * 2018-09-14 2018-11-20 南京理工技术转移中心有限公司 A kind of cultivation surroundings monitoring system and its working method
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN109186040A (en) * 2018-09-14 2019-01-11 南京理工技术转移中心有限公司 A kind of metro environment remote monitoring system and its working method
CN110990806A (en) * 2019-11-17 2020-04-10 武汉市中心医院 Clinical teaching information authorization system and authorization method thereof
CN111882720A (en) * 2020-08-06 2020-11-03 珠海优特物联科技有限公司 Lock control method and device based on cloud operation ticket
CN112182535A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112328996A (en) * 2020-11-25 2021-02-05 杭州和利时自动化有限公司 Operation authentication method, device, equipment and storage medium based on DCS system
CN113204750A (en) * 2021-05-28 2021-08-03 南京大学 Android resource authority dynamic management system based on user intention and implementation method thereof

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034036A (en) * 2010-09-07 2011-04-27 北京握奇数据***有限公司 Permission management method and equipment
WO2011126312A3 (en) * 2010-04-06 2012-01-19 Samsung Electronics Co., Ltd. Method and apparatus for managing remote access authority in upnp remote access service
CN103235873A (en) * 2013-04-07 2013-08-07 浙江大学医学院附属第二医院 Level-to-level administration control system for permission of doctor's prescription to antibacterial agents
CN103532933A (en) * 2013-09-28 2014-01-22 刘琦 Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
US20140223516A1 (en) * 2013-02-05 2014-08-07 Google Inc. Authorization flow initiation using short-term wireless communication
CN104601353A (en) * 2013-10-31 2015-05-06 北京神州泰岳软件股份有限公司 Operation and maintenance operation method and system for network security production equipment
CN104751333A (en) * 2013-12-30 2015-07-01 腾讯科技(深圳)有限公司 Information interaction method, device and system
WO2016060489A1 (en) * 2014-10-15 2016-04-21 Samsung Electronics Co., Ltd. Method for authentication and electronic device supporting the same
CN105577621A (en) * 2014-10-16 2016-05-11 腾讯科技(深圳)有限公司 Service operation verification method, apparatus and system thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011126312A3 (en) * 2010-04-06 2012-01-19 Samsung Electronics Co., Ltd. Method and apparatus for managing remote access authority in upnp remote access service
CN102034036A (en) * 2010-09-07 2011-04-27 北京握奇数据***有限公司 Permission management method and equipment
US20140223516A1 (en) * 2013-02-05 2014-08-07 Google Inc. Authorization flow initiation using short-term wireless communication
CN103235873A (en) * 2013-04-07 2013-08-07 浙江大学医学院附属第二医院 Level-to-level administration control system for permission of doctor's prescription to antibacterial agents
CN103532933A (en) * 2013-09-28 2014-01-22 刘琦 Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
CN104601353A (en) * 2013-10-31 2015-05-06 北京神州泰岳软件股份有限公司 Operation and maintenance operation method and system for network security production equipment
CN104751333A (en) * 2013-12-30 2015-07-01 腾讯科技(深圳)有限公司 Information interaction method, device and system
WO2016060489A1 (en) * 2014-10-15 2016-04-21 Samsung Electronics Co., Ltd. Method for authentication and electronic device supporting the same
CN105577621A (en) * 2014-10-16 2016-05-11 腾讯科技(深圳)有限公司 Service operation verification method, apparatus and system thereof

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848117A (en) * 2018-09-14 2018-11-20 南京理工技术转移中心有限公司 A kind of cultivation surroundings monitoring system and its working method
CN109164223A (en) * 2018-09-14 2019-01-08 南京理工技术转移中心有限公司 A kind of water environment monitoring processing system and its working method
CN109186040A (en) * 2018-09-14 2019-01-11 南京理工技术转移中心有限公司 A kind of metro environment remote monitoring system and its working method
CN110990806A (en) * 2019-11-17 2020-04-10 武汉市中心医院 Clinical teaching information authorization system and authorization method thereof
CN111882720A (en) * 2020-08-06 2020-11-03 珠海优特物联科技有限公司 Lock control method and device based on cloud operation ticket
CN112182535A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112328996A (en) * 2020-11-25 2021-02-05 杭州和利时自动化有限公司 Operation authentication method, device, equipment and storage medium based on DCS system
CN113204750A (en) * 2021-05-28 2021-08-03 南京大学 Android resource authority dynamic management system based on user intention and implementation method thereof
CN113204750B (en) * 2021-05-28 2023-11-17 南京大学 An Zhuozi source authority dynamic management system based on user intention and implementation method thereof

Similar Documents

Publication Publication Date Title
CN107196896A (en) Method for managing user right and device
EP2460307B1 (en) System and method for strong remote identity proofing
CN101047503B (en) Method and system for fetching cipher
CN104202162B (en) A kind of system logged in based on mobile phone and login method
CN108959933A (en) Risk analysis device and method for the certification based on risk
CN108989278A (en) Identification service system and method
CN112000744B (en) Signature method and related equipment
US9325711B2 (en) Apparatus and data processing systems for accessing an object
CN104184705A (en) Verification method, apparatus, server, user data center and system
WO2007138596A2 (en) User group identification
CN104184709A (en) Verification method, device, server, service data center and system
US10803154B2 (en) Multicomputer system for user data authentication and processing
CN103888255A (en) Identity authentication method, device and system
CN108898728A (en) Intelligent interaction equipment and voting method, device and system thereof
CN104125485B (en) A kind of user profile shared method, equipment and system
CN109255619A (en) A kind of identity identifying method and equipment based on block chain
CN107564140A (en) A kind of gate inhibition invites authorization identifying system
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN105915542A (en) Distributed cloud authentication system based on random instruction, apparatus and method thereof
CN111369260A (en) Privacy-protecting risk prediction method and device
CN110120928A (en) A kind of identity authentication method, device, server and computer-readable medium
CN107862198A (en) One kind accesses verification method, system and client
CN105827571A (en) UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN107135076A (en) A kind of participatory of without TTP perceives incentive mechanism implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 818, 8 / F, 34 Haidian Street, Haidian District, Beijing 100080

Applicant after: BEIJING ULTRAPOWER SOFTWARE Co.,Ltd.

Address before: 100089 Beijing city Haidian District wanquanzhuang Road No. 28 Wanliu new building block A Room 601

Applicant before: BEIJING ULTRAPOWER SOFTWARE Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922

RJ01 Rejection of invention patent application after publication